Connectors
Maverics Connectors integrate the Orchestrator to distributed identity systems. Connecting identity systems is the first step in building a distributed Identity Fabric. Once identity systems are connected, you can begin moving identities, policies, and configurations across them. Additionally, use Connectors to route authentication and attribute requests to different identity systems and deliver authenticated users and identity data to applications.
Broadly, there are three categories of Connectors:
- Cloud identity systems: these include Okta and Azure AD and tend to use standards such as SAML and OIDC for authentication and expose proprietary APIs for managing users, groups, permissions, policies, and other platform services.
- Standards-based software: these include software products such as PingFederate and WS02 Identity Server, which also use standards such as SAML and OIDC and SCIM for user management.
- Legacy software and data stores: these include products such as CA SiteMinder, Oracle Access Manager, LDAP, Active Directory, Oracle, and MySQL databases. While datastore connections are over standards such as LDAP or SQL, legacy software is almost exclusively proprietary.
For integration instructions, consult the following connector configuration guides:
- 1Kosmos
- Active Directory
- ADFS
- Amazon Cognito
- Auth0
- Azure AD
- Generic OIDC
- Generic SAML
- HYPR
- MySQL - Oracle DB
- LDAP
- Okta
- PingFederate
- Windows Client Authenticator
- WS02
Use any of these connectors by setting the corresponding configuration options in your maverics.yaml
config file.